A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence. Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol. It is incredible, but authorities […]
Producers from the German broadcaster ARD have conducted an interesting experiment to demonstrate how to buy a weapon on the dark web. When journalists write about the black markets hosted on the dark web always describe these places as crucial aggregators where it is possible to buy any kind of illegal product and service. A keyboard, […]
Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick. Researchers at Microsoft’s Malware Protection Center are warning of a new technique attackers are using to allow macro malware elude detection solutions. The experts first spotted the technique while analyzing a file […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that I’m one of the finalists for the best European Security Blog, please vote for SecurityAffairs in all the sessions it is mentioned. https://www.surveymonkey.com/r/secbloggerwards2016 #securityaffairs Malware used in the recent banking cyberheists is […]
A worm is infecting routers and other wireless devices across the world made by the Ubiquiti Networks company. An insidious worm is infecting routers and other wireless devices made by Ubiquiti Networks across the world. ISPs worldwide reported the malware-based attacks, the threat can take complete control of the wireless networking equipment by exploiting a year-old remote […]
A study of online trackers carried out by researchers at Princeton University allowed the identification of the Audio fingerprinting tracking technique. Privacy is probably one of the most debated arguments when dealing with the Internet, we discussed several times the way to protect anonymity online and which are the attacks law enforcement and intelligence agencies carry on […]
A researcher received a $5,000 bounty after finding two flaws that could have allowed attackers to run brute-force attacks on Instagram accounts. The Belgian security researcher Arne Swinnen discovered two security flaws affecting the Instagram platform that allowed attackers to launch brute force attacks against its accounts. The bug hunter received a $5,000 bounty from Facebook […]
The Ecuador Bank Banco Del Austro of Cuenca was hacked by threat actors that once again involved the SWIFT systems to stole $12 Million. A third bank was the victim of a cyber heist, the Ecuador Bank was hacked by threat actors that targeted the SWIFT systems and stole $12 Million. In February hackers have stolen $81 Million from the […]
Facebook might have violated federal privacy laws by scanning users’ private messages.Users launched a class action against the IT giant. Once again we are discussing privacy issues and IT giants, this time, the attention is on Facebook that has been sued for illegally scanning the private messages of its unaware users. In Northern California, users have launched […]
The popular security expert John McAfee and a team of four hackers demonstrated that is is possible to read WhatsApp message. The cybersecurity expert John McAfee and four hackers demonstrated that is is possible to read a WhatsApp message even if it is encrypted. The hacker crew used their servers located in a remote section […]